Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe
Resource
win10v2004-20221111-en
General
-
Target
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe
-
Size
212KB
-
MD5
2b3a6012b42172a7ba03a220f50bc13b
-
SHA1
b50678f42f08dbf12633b9ad0e2c09d2182905b7
-
SHA256
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d
-
SHA512
8edd83146c45d5e486bc411649f148216944bb8e6e9055d5852a33395999ddd4457b5cbcf6ba1114a750ac9f750153beaa73f9718307fde680d39f12df2765f6
-
SSDEEP
6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDmG:dHp/urb4A1WdBfp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Program FilesCDJ6E2.exepid process 2032 Program FilesCDJ6E2.exe -
Deletes itself 1 IoCs
Processes:
WScript.Exepid process 1504 WScript.Exe -
Drops file in Program Files directory 2 IoCs
Processes:
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exedescription ioc process File opened for modification \??\c:\Program Files\Common Files\t.ico b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe File opened for modification \??\c:\Program Files\Common Files\d.ico b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
IEXPLORE.exeIEXPLORE.EXEIEXPLORE.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000f4218c9fbfa62f8d639c09120b3bed829b3dd505602a8463c265c964cbc3a8a3000000000e8000000002000020000000335da3b35181dae82ee499bb5706ce445ba5fc85aeb3995e676057020832fb652000000079ad43a5b5c8a4f193545ab101c979060010ba43862908c8b85d10ea45feb7104000000068bf1f75fc0e5114986c716c8a6c3231b2be0f3fe0e2659764751deb3656e84b1f77b9ff8dd1870258831ee92a1c79aa69db876592b2237dcc351f04c68e4e09 IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40f5bb1899ffd801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{38D228E1-6B8C-11ED-9201-42465D836E7B} = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376013526" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{388D2101-6B8C-11ED-9201-42465D836E7B} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe -
Modifies registry class 60 IoCs
Processes:
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh\ = "hdh" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.h35 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE,0" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.h35\ = "h35" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command\ = "IEXPLORE.EXE http://www.loliso.com/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hdh b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon\ = "c:\\Program Files\\Common Files\\d.ico" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.hli b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hyx\ = "hyx" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell\open\command\ = "IEXPLORE.EXE http://www.piaofang.net/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htb b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command\ = "IEXPLORE.EXE http://www.t17t.com/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,130" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,41" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\DefaultIcon\ = "%SystemRoot%\\SysWow64\\SHELL32.dll,139" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hpf\shell b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hli\ = "hli" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\ b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command\ = "IEXPLORE.EXE http://www.d91d.com/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htb\ = "htb" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hdh b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\h35\shell\open b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\shell\open\command\ = "IEXPLORE.EXE http://taobao.loliso.com/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\hdh\shell\open\command\ = "IEXPLORE.EXE http://www.henbucuo.com/?1193" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hli\DefaultIcon b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\hyx\shell\open\command b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.hpf\ = "hpf" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htb\DefaultIcon\ = "c:\\Program Files\\Common Files\\t.ico" b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
IEXPLORE.exeIEXPLORE.exepid process 1932 IEXPLORE.exe 568 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exeProgram FilesCDJ6E2.exeIEXPLORE.exeIEXPLORE.EXEIEXPLORE.exeIEXPLORE.EXEpid process 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe 2032 Program FilesCDJ6E2.exe 1932 IEXPLORE.exe 1932 IEXPLORE.exe 788 IEXPLORE.EXE 788 IEXPLORE.EXE 568 IEXPLORE.exe 568 IEXPLORE.exe 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE 1388 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exeProgram FilesCDJ6E2.exeIEXPLORE.exeIEXPLORE.exedescription pid process target process PID 1292 wrote to memory of 2032 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Program FilesCDJ6E2.exe PID 1292 wrote to memory of 2032 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Program FilesCDJ6E2.exe PID 1292 wrote to memory of 2032 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Program FilesCDJ6E2.exe PID 1292 wrote to memory of 2032 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe Program FilesCDJ6E2.exe PID 2032 wrote to memory of 1932 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 1932 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 1932 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 1932 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 1932 wrote to memory of 788 1932 IEXPLORE.exe IEXPLORE.EXE PID 1932 wrote to memory of 788 1932 IEXPLORE.exe IEXPLORE.EXE PID 1932 wrote to memory of 788 1932 IEXPLORE.exe IEXPLORE.EXE PID 1932 wrote to memory of 788 1932 IEXPLORE.exe IEXPLORE.EXE PID 2032 wrote to memory of 568 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 568 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 568 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 2032 wrote to memory of 568 2032 Program FilesCDJ6E2.exe IEXPLORE.exe PID 1292 wrote to memory of 1504 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe WScript.Exe PID 1292 wrote to memory of 1504 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe WScript.Exe PID 1292 wrote to memory of 1504 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe WScript.Exe PID 1292 wrote to memory of 1504 1292 b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe WScript.Exe PID 568 wrote to memory of 1388 568 IEXPLORE.exe IEXPLORE.EXE PID 568 wrote to memory of 1388 568 IEXPLORE.exe IEXPLORE.EXE PID 568 wrote to memory of 1388 568 IEXPLORE.exe IEXPLORE.EXE PID 568 wrote to memory of 1388 568 IEXPLORE.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe"C:\Users\Admin\AppData\Local\Temp\b7a8127390cba3c0b02c43aba68198b1e9ed74eb6713981f407e572c44d6aa4d.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\Program FilesCDJ6E2.exe"c:\Program FilesCDJ6E2.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:788
-
-
-
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:568 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
-
-
C:\Windows\SysWOW64\WScript.ExeWScript.Exe jies.bak.vbs2⤵
- Deletes itself
PID:1504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5f95253948aaee5060a4ab17abd4a29cf
SHA1dbe05b511ae47f3b3d23e57b5e888de50275910a
SHA256d034004b52d2a544f05c5884de7662bd7df6457a513f501b863aeb9fac6b1059
SHA5122aa844d1effa0287da676b636b6666a6c01b4e5ba1b738ac843c60357a7c54f774b641feb4d764206a3f7256005e28135f131e100d385557884be4c3f71e6a99
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{388D2101-6B8C-11ED-9201-42465D836E7B}.dat
Filesize5KB
MD5bc47b4798c919bd0c0408b8be6867b5f
SHA1409ebf7c2b00b61d93ab95d1180e57fdfa288d96
SHA256a888c629020b31d45345ca12c4bac12e839eaa55258fe7899aa709c07f7b386d
SHA512027d9297763b744d88fee73a2e1723969a78b480a8a4febd2c86548ac46528673ba2ca898787c969dd28f310ca3071db6d7cf4a057d32f24288a4935e4a6dde1
-
Filesize
486B
MD5d92b2c577e84a9ecb8cb58d9a4da5fcf
SHA17a992a0f45d2918c5666de1420a7f033f2905d20
SHA2566d712e89c8e837129d4c965789b38bbdf41afac77e221f39de2d95dd5831bd17
SHA512f8b146fac6a084876fece5d43b1168bab0c6fee340baaea730a02d7c81bc189802d41ec124ab2b06ba5f4fd7af5ed6b5d03a1fbc409f690f7a033663a6f737c3
-
Filesize
603B
MD556d5f36c54f59f712005207aeeaf51fb
SHA12252e4a16b19ec17ccc9e5880e0138f1c7b49049
SHA25639267c505b6f5c946ae2c06636fc136018761fdebd3d1a9fdb59b427cfe665ee
SHA512e76518c35eba4971bb49090cab5f09aa099225543bdf6b26c98b9bbcaacc778cd4ce0c6f48063e6744302bdacc312a33aa294bd1cafd3d8d5161418e120f3702